Duties: Roles and Responsibilities:
Reverse engineer Android apps, malwares and SDKs to identify threat behaviors and attack patterns.
Perform static and dynamic analysis of APKs, binaries, and mobile executables Analyze different types/families of malwares such as viruses, worms, trojans, and ransomware to understand their functionality, origin and potential impact.
Document investigation, findings and prepare clear, actionable reports.
Develop framework/custom scripts and tools to automate the malware analysis process.
Use industry standard tools such JADx, Ghidra, Frida, IDA Pro and Burp Suite Supporting testing different project involving malware detection, prevention, test detection accuracy and find out gaps in detection engine.
Stay updated with the latest cybersecurity trends, threats, and vulnerabilities.
Skills: Required Experience and Education:
3+ years of proven work experience in malware analysis and research
Strong knowledge of malware operation and indicators of compromise.
Good understanding of tools like Metasploit, cobalt strike etc.
Experience with reverse engineering tools (such as IDA Pro, OllyDbg, or Ghidra).
Proficient in scripting languages (such as Python, Bash).
Experience with Android OS architecture and application structure is preferred (APK format, permissions model, services, activities).
Preferred experience with sandbox environment to executing malware.
Good communication skills.
Education requirement: College degree
Necessary Skills and Attributes:
Customer-centric: Anybody you interact with can be considered a customer.
Deep-diver: Curious about everything and insists on understanding the big picture.
Quality advocate: Maintain high standards when it comes to product quality.
Innovator: Constantly on the lookout for improving what we do.
Proactive: self-starter with a keen eye for details with focus on end-user experiences and ability to go above and beyond to ensure a high-quality release in a fast paced and changing environment